Embodiments of the invention relate to generating compliance scores based on first party data on a second party system for viewing by a third party.
|
1. A computer implemented method, comprising:
receiving, by a computer system of a second party, an authorization from a first party that a third party be permitted to access first party data stored by the second party, the first, second and third party all distinct from each other;
permitting, by the computer system and responsive to the authorization, the third party to access the stored first party data;
selecting, by the computer system, computational rules to apply to the stored first party data;
computing, by a scoring engine of the computer system, a compliance score based on the computational rules and the stored first party data, in which computing the compliance score includes:
aggregating a plurality of sub-scores from a plurality of the computational rules to determine the compliance score; and
includes applying one or more parameter modifiers to one or more of the plurality of sub-scores to weight one or more of a plurality of sub-scores from a plurality of the computational rules, and aggregating the plurality of sub-scores to determine the compliance score; and
outputting the compliance score.
2. The computer implemented method of
3. The computer implemented method of
4. The computer implemented method of
5. The computer implemented method of
6. The computer implemented method of
7. The computer implemented method of
8. The computer implemented method of
9. The computer implemented method of
10. The computer implemented method of
11. The method of
categorizing the one or more sub-scores or the compliance score to one or more score bands describing preselected value ranges for the one or more sub-scores or compliance score; and
in which outputting the compliance score includes causing the one or more sub-scores or the compliance score to be presented, by the computer system to a user interface at a first party computing device or a third party computing device, as a member of one or more of the preselected value ranges.
12. The computer implemented method of
the authorization is an electronic authorization received from a first party computing device; and
selecting computational rules to apply to the stored first party data includes receiving one or more selected computational rules from a third party computing device.
13. The computer implemented method of
14. The computer implemented method of
15. The computer implemented method of
16. The computer implemented method of
17. The computer implemented method of
|
This application claims priority to U.S. Provisional Patent Application No. 62/915,868, filed 16 Oct. 2019, which is incorporated herein, in its entirety, by this reference.
When businesses sell or buy goods, they are required by law to compute the amounts of money they owe as taxes to various tax jurisdictions, and then pay (“remit”) these amounts to the tax jurisdictions. If the businesses fail to accurately report and pay taxes they owe, they may become subject to audits and fines—and ignorance of the law is not an excuse.
There are many types of taxes for such businesses. Such taxes include sales tax, use tax, excise tax, value-added tax, industry-specific taxes, cross-border taxes, and so on. Further, for a single transaction, taxes may be due to more than one tax jurisdiction, such as states, localities within the states, etc.
Determining the taxes due is often very complex. There are over 10,000 tax jurisdictions in the US, and millions of taxability rules related to various products and services. Complexities in determining the tax due may arise from the location of the buyer, the seller, a distributor, etc. For example, some state and local authorities have origin-based tax rules, which means that a sales tax is charged from the seller's location; other state and local authorities have destination-based tax rules, which means that a sales tax is charged from the buyer's location.
Additional complexities arise from the fact that different tax jurisdictions charge different percentage rates. These different tax jurisdictions can be different states, counties, cities, municipalities, special taxing jurisdictions, and so on.
In addition to the amount of the tax, sellers of goods are subjected to many requirements about the taxes they owe. In particular, a seller must determine whether, and when, they must collect taxes in each tax jurisdiction. For example, for each state, a seller may need to register with that state's taxing agency, set up internal processes for collecting sales tax in accordance with the tax rules of the state, keep records for the collected sales tax, file reports with the state, and finally pay the tax to the state.
Sellers may further try to look for instances when they do not owe sales tax. For a first example, in some instances a tax jurisdiction may offer a temporary tax holiday. For a second example, a tax jurisdiction may exempt the sale of certain products and services from sales tax, but that is not uniform across states; for instance, in 2018, the sale of cowboy boots was exempt from sales tax in Texas, but not in New York. For a third example, when a seller buys certain items for resale, the transaction may be exempt from sales tax, as long as the seller creates and maintains proper certificates to that effect.
Businesses generally collect information relating to their operations, such as by using enterprise resource planning (“ERP”) software applications and accounting applications. ERP applications manage information relating to a business's activities, such as sales, resource management, production, inventory management, delivery, billing, and so on. Accounting applications manage a business's accounting information, such as purchase orders, sales invoices, payroll, accounts payable, accounts receivable, and so on.
ERP applications, accounting applications, e-commerce applications and other conventionally used applications generally cannot provide accurate tax information, such as when transactions are complex or span geographical boundaries. In particular, such applications may over- or under-estimate tax owed to governments, for example by failing to consider municipal taxes. Moreover, such applications generally do not provide an ability for businesses to model the impact that various contemplated changes may have on the business's bottom line. As an example, these applications cannot model the impact on taxes of transferring production of goods from one geographical area to another, effectively changing the tax jurisdiction.
Embodiments of the invention relate to generating compliance scores based on first party data on a second party system for viewing by a third party.
A computer implemented method is disclosed. The computer implemented method includes receiving, by a computer system of a second party, an authorization from a first party that a third party be permitted to access first party data stored by the second party. The computer implemented method includes permitting, by the computer system and responsive to the authorization, the third party to access the stored first party data. The computer implemented method includes selecting, by the computer system, computational rules to apply to the stored first party data. The computer implemented method includes computing, by a scoring engine of the computer system, a compliance score based on the computational rules and the stored first party data. The computer implemented method includes outputting the compliance score.
A system for generating a compliance score is disclosed. The system includes one or more processors. The system includes a non-transitory computer-readable storage medium having instructions stored thereon which, when executed by the one or more processors, result in operations. The operations include receiving, by a computer system of a second party, an authorization from a first party that a third party be permitted to access first party data stored by the second party. The operations include permitting, by the computer system and responsive to the authorization, the third party to access the stored first party data. The operations include selecting, by the computer system, computational rules to apply to the stored first party data. The operations include computing, by a scoring engine of the computer system, a compliance score based on the computational rules and the stored first party data. The operations include outputting the compliance score.
A computer implemented method is disclosed. The computer implemented method includes receiving, by a third party from a computer system of a second party, an authorization from a first party to access first party data stored by the second party on the computer system. The computer implemented method includes accessing, pursuant to the authorization, the stored first party data in the computer system. The computer implemented method includes causing the computer system to select at least one of a plurality of computational rules. The computer implemented method includes causing a scoring engine of the computer system to apply the selected at least one of a plurality of computational rules to the stored first party data for computing a compliance score. The computer implemented method includes causing the computer system to output the compliance score to the third party.
A system for generating a compliance score is disclosed. The system includes one or more processors. The system includes a non-transitory computer-readable storage medium having instructions stored thereon which, when executed by the one or more processors, result in operations. The operations include receiving, by a third party from a computer system of a second party, an authorization from a first party to access first party data stored by the second party on the computer system. The operations include accessing, pursuant to the authorization, the stored first party data in the computer system. The operations include causing the computer system to select at least one of a plurality of computational rules. The operations include causing a scoring engine of the computer system to apply the selected at least one of a plurality of computational rules to the stored first party data for computing a compliance score. The operations include causing the computer system to output the compliance score to the third party.
A computer implemented method is disclosed. The computer implemented method includes causing, by a first party computing device, first party data to be stored in a computer system of a second party in communication with the first party computing device. The computer implemented method includes accessing, by a user interface of the computer system, a scoring engine stored on the computer system. The computer implemented method includes causing, by the user interface, the scoring engine to apply at least one stored computational rule to the stored first party data to compute a compliance score and display the compliance score on the user interface. The computer implemented method includes providing, by the user interface, a network address of a third party. The computer implemented method includes causing, by the user interface, the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system.
A system for generating a compliance score is disclosed. The system includes one or more processors. The system includes a non-transitory computer-readable storage medium having instructions stored thereon which, when executed by the one or more processors, result in operations. The operations include causing, by a first party computing device, first party data to be stored in a computer system of a second party in communication with the first party computing device. The operations include accessing, by a user interface of the computer system, a scoring engine stored on the computer system. The operations include causing, by the user interface, the scoring engine to apply at least one stored computational rule to the stored first party data to compute a compliance score and display the compliance score on the user interface. The operations include providing, by the user interface, a network address of a third party. The operations include causing, by the user interface, the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system.
Features from any of the disclosed embodiments may be used in combination with one another, without limitation. In addition, other features and advantages of the present disclosure will become apparent to those of ordinary skill in the art through consideration of the following detailed description and the accompanying drawings.
The drawings illustrate several embodiments of the invention, wherein identical reference numerals refer to identical or similar elements or features in different views or embodiments shown in the drawings.
Embodiments of the invention relate to generating and obtaining compliance scores of a first party's compliance with one or more requirements with a second party computer system on behalf of a third party.
The DRP 140 is in electronic communication with one or more of the first party 120, the online service platform (“OSP”) 130, and the reviewer 110. For example, the DRP 140 may be accessible to the reviewer 110 and the first party 120 via a network, such as via the world wide web, a LAN, or the like. A user 112 may be a representative of the reviewer 110 (e.g., third party) and may access and communicate with the DRP 140 (e.g., second party) via a computer 114, such as via the network. A user 122 of the first party 120 may access and communicate with the DRP 140 via a computer 124, such as via the network. The reviewer 110, the first party 120, and the OSP 130 may electronically communicate with the DRP 140 via interfaces of the DRP. The OSP 130 may communicate with the DRP 140 through one or more application programming interfaces (APIs) (not shown). The first party 120 may electronically access and communicate with the OSP 130 via a network using one or more APIs (not shown). The computing devices of one or more of the DRP 140, the first party 120, the reviewer 110, and the OSP 130 may thus form a network for generating compliance scores with the first party data using the scoring engine 150 of the DRP 140. Each of these devices may amount to a corresponding system, be part of a corresponding system, and so on.
The DRP 140 may thus generate compliance scores, shown as results 177, using the scoring engine 150 and the first party data 148. The one or more criteria are examined by one or more computational rules 155 of the scoring engine 150 being applied to the first party data 148. Accordingly, a third party reviewer 110 may utilize the DRP 140 (second party) to determine a first party's qualifications for a benefit offered by the third party, based on the first party data 148. The third party reviewer 110 may not even view the first party data 148. Instead, the DRP 140 accesses and utilizes the first party data 148 in a selected way to produce the compliance scores.
The first party data 148 may be provided to and stored in the DRP 140 in data storage 144 therein. For example, the first party 120 may input at least some of the first party data 148 from the first party's own data 128. The DRP 140 includes a user interface (UI) 145 for communicating with the user 122 of the first party 120 via the computer 124 and a user interface 146 for communicating with the user 112 of the reviewer 110 via the computer 114. UIs 145, 146 may be implemented in a number of ways, for example web-based, be parts of a software connector, and so on. The first party's own data 128 may be stored on a device separate from the DRP 140, and data 128 may be transferred thereto, either directly via the user interface 145 or an API (not shown), or indirectly via the OSP 130. For example, the first party 120 may upload at least some of the first party's own data 128 into data storage 144 of the DRP 140 via the user interface 145 (and computer 124) or via one or more APIs. The first party 120 may transfer at least some of the first party's own data 128 to the OSP 130 to form at least some of the first party data 138 stored on the OSP 130. At least some of the first party data 138 may be transferred to the data storage 144 to be stored as stored first party data 148.
The first party's own data 128, the first party data 138, or the stored first party data 148 may include sales data, tax data (e.g., sales tax remittance data), invoice data, account data, address data, public records, investigative data, or histories of any of the foregoing, of the first party 120 or clients of the first party 120. For example, one or more datasets within the first party's own data 128, the first party data 138, or the stored first party data 148 may include one or more of sales transaction data, sales tax data, accuracy of invoice data, address data, or open invoice data corresponding to the first party stored on a service platform computing system (OSP 130). The first party's own data 128, the first party data 138, or the stored first party data 148 may contain sensitive data or data that the first party does not wish to disseminate. Accordingly, the first party 120 may limit or control access of outside entities, such as the reviewer 110 or DRP 140, to use the first party's own data 128, the first party data 138, or the stored first party data 148.
The first party 120 may provide authorization for one or more of the DRP 140 (e.g., second party) or the reviewer 110 (e.g., third party) to access and utilize at least some of the first party's own data 128, the first party data 138, or the stored first party data 148. The authorization may be electronic authorization from the first party 120. For example, the first party 120 may provide electronic authorization for the reviewer 110 or DRP 140 to use one or more of the first party's own data 128, the first party data 138, or the stored first party data 148, via the user interface 145. The authorization may include a digital code previously established on behalf of the first party 120 to grant access to the stored first party data 148. The authorization may be received by one or more of the first party 120, the reviewer 110 (third party), or the DRP 140 (second party). For example, the reviewer 110 may receive authorization from the first party 120 via the DRP 140 at a network address of the reviewer 110.
Responsive to receiving the authorization, the DRP 140 may access on behalf of the reviewer 110 or permit the reviewer 110 to access the stored first party data 148. For example, the DRP 140 may permit the computer 114 to access the stored first party data 148 in the data storage 144 via the user interface 146 by receiving an authorization code from the reviewer or recognizing a network address of the reviewer after authorization is given.
The data storage 144 may be accessed by the scoring engine 150 or the reviewer 110 to apply the one or more computational rules 155 to at least a portion of the stored first party data 148. In some examples, the scoring engine 150 or the reviewer 110 may fetch specific data sets or subsets of the stored first party data 148 for use therein. The first party 120 or the reviewer 110 may specify one or more portions of the stored first party data 148 to be utilized by the scoring engine 150.
The scoring engine 150 includes machine readable and executable instructions to query at least a portion of the stored first party data 148 to determine compliance with one or more criteria of the scoring engine 150. The scoring engine 150 stores one or more computational rules 155 for calculating one or more compliance scores with the first party data 148. The one or more computational rules 155 include electronic instructions for determining the satisfaction of, or a level or satisfaction of, one or more requirements or criteria set forth in the instructions. The requirements, criteria, or the computational rules 155 may be selected or established by one or more of the reviewer 110, the third party 120, or the DRP 140. Accordingly, the compliance scores indicate the presence of, or a magnitude of, the first party's satisfaction of one or more requirements of the reviewer 110 for providing a benefit to the third party 120, based on one or more portions of the stored first party data 148.
In some examples, the scoring engine 150 includes a plurality of scoring engines. Each of the plurality of scoring engines may be programmed to perform a different function or use different default computational rules than other scoring engines.
The one or more computational rules 155 may include a plurality of computational rules for calculating one or more sub-scores. The computational rules 155 includes two types, default 156 and custom 157. Each of the plurality of computational rules may be applied to a portion of the stored first party data to calculate the plurality of sub-scores. The one or more sub-scores may aggregate (e.g., add up) to form the compliance score. Each of the one or more sub-scores may be an individual compliance score. For example, each of the one or more sub-scores may demonstrate compliance with a specific requirement. Accordingly, the plurality of sub-scores may add up to form a larger overall picture of the first party's compliance with a plurality of requirements.
The one or more computational rules selected for use in the scoring engine 150 may be selected from computational rules 155 stored in a memory of DRP 140. At least some of the stored computational rules 155 may be presented to the first party 120 or the reviewer 110 (third party) via the user interface 145 or 146 in a viewable range 170. The viewable range 170 is a portions of the scoring engine 150 that is viewable to a user via a user interface, such as UIs 145, and 146. For example, the viewable range 170 may present the one or more of the computational rules 155 (for use by the scoring engine 150 with the first party data 148 to produce the results 177) to the first party 120 or the reviewer 110. In embodiments, the viewable range 170 may show more or fewer elements than indicated in
The default computational rules 156 may include popular computational rules. One or more of the first party 120 or the reviewer 110 may select one or more specific computational rules from the default computational rules 156, via the user interface 145 or 146, respectively. The DRP 140 may receive instructions from one or more of the user 122 (first party 120) or the user 112 (reviewer 110 or third party) to use one or more computational rules stored in the DRP 140 (in the scoring engine 150).
The custom computational rules 157 may include one or more computational rules that are modifiable or selected (e.g., preselected) by one or more of the first party 120 or the reviewer 110. The custom computational rules 157 may be uploaded to the scoring engine 150 by the reviewer 110 via the user interface 146 or the first party 120 via the user interface 145. One or more of the first party 120 or the reviewer 110 may provide instructions to the DRP 140 to utilize one or more of the default computational rules 156 or the custom computational rules 157 against the stored first party data 148.
The parameter values 152 are values that are used to weight one or more of the computational rules, sub-scores, or compliance scores. The parameter values 152 include two types, default 153 and custom 154, similarly with stored rules 155. The parameter values 152 may include one or more parameter modifiers, which weight one or more of the computational rules, sub-scores, or compliance scores according to a selected value. For example, the reviewer 110 may instruct the DRP 140 to apply an “increase weight by two” parameter modifier to a sub-score corresponding to an amount of outstanding sales tax remittance obligations. Accordingly, the sub-score corresponding to an amount of outstanding sales tax remittance obligations may form a larger part of an aggregate compliance score. Thus, beyond selecting the computational rules themselves, the reviewer 110 or the first party 120 may control how much the results of each computational rule contribute to a final compliance score. The custom computational rules 157 and the custom parameter values 154 may be adjusted after the scoring engine 150 operates on the first party data 148, to offer different insights into the first party data 148.
The computational rules 155 may be applied to all of, a portion of, or portions of the stored first party data 148. For example, the computational rules 155 may include instructions to query all of or only specific portions of the stored first party data 148. One or more of the first party 120 or the reviewer 110 may select (e.g., electronically identify) specific portions of the stored first party data 148 on which to apply the computational rules 155 in the scoring engine 150.
The scoring engine 150 may compute the compliance score(s) using the computational rules 155 and the first party data 148. The compliance score(s) may be presented as results 177. For example, the results 177 may be output to one or more of the reviewer 110 or the first party 120 via the viewable range 170. The results 177 may be output to one or more of the reviewer 110 or the first party 120 via electronic communication. For example, the DRP 140 may send an electronic message including the results 177 to one or more of the reviewer 110 or the first party 120.
The scoring engine 150 may also store computational rules for categorizing one or more sub-scores or the compliance score to one or more score bands describing preselected value ranges for the one or more sub-scores or compliance score. For example, the score bands may include value ranges of sub-scores or compliance scores associated with certain values or outcomes according to one or more computational rules, such as high compliance, medium compliance, and low compliance; low risk, neutral risk, or high risk; or the like. The score bands, and the place of the first party's compliance score(s) therein, may be visually presented to one or more of the first party 120 or the reviewer 110. For example, the score bands may be presented as green for a range of values that are associated with high compliance with one or more computational rules, yellow for a range of values that are associated with medium compliance, and red for a range of values that are associated with low compliance. The computational rules may include rules to categorize each sub-score of a plurality of sub-scores and a total compliance score that is a total of one or more of the sub-scores into respective value ranges. The computational rules (e.g., the custom computational rules 157) may include value ranges selected by one or more of the first party 120 or the reviewer 110 (third party). The compliance score(s) may be presented as results 177 to one or more of the first party 120 or the reviewer 110 with, or as a part of, preselected value ranges, such as in a score band associated therewith.
The first party 120 may provide authorization for the DRP 140 to share the results 177 with third parties, such as the reviewer 110. For example, the first party 120 may provide a network address of the third party and may input instructions into the DRP 140 to output authorization to the third party to access one or more of the first party data 148 or the results 177. Accordingly, the first party 120 may control access by third parties to its own data and results calculated therefrom.
The viewable range 270 may include field names (FN) for names of fields having selected first party data therein. The field names specify which portions of the first party data are queried by the scoring engine. For example, the field names correspond to specific data identifiers (DIDs) in the first party data 248. The DIDs may be used to fetch the underlying data (DT) from the first party data 248. The data (DT) may be placed into the viewable range 270 as data values (V). The viewable range 270 includes rule appearances (RA) which provides the appearance and name of the computational rule(s) corresponding thereto. For example, the RA may describe the computational rule, the criteria by which the computational rule(s) function, the mathematical functions therein, or the intended outputs of the computational rule(s). The viewable range 270 includes parameter values PV that are modifiers which weight the output of the corresponding computational rules according to the magnitude of the PV. The viewable range 270 includes sub-scores (SS) corresponding to the output of each computational rule applied by the scoring engine. The sub-scores can be added to provide a total score (TS) 289.
The viewable range 270 may include a first field name 211, a first value 241, a first rule appearance 251, a first parameter value 271, and a first sub-score 281. The viewable range 270 may include a second field name 212, a second value 242, a second rule appearance 252, a second parameter value 272, and a second sub-score 282. The viewable range 270 may include an additional field names, additional values, additional rule appearances, additional parameter values, and additional sub-scores.
In practice, the scoring engine may utilize the field names 211 and 212 to call the data 231 and 232 at the corresponding DIDs 221 and 222. The data 231 and 232 may be imported into the viewable range 270 as values 241 and 242. The values 241 and 242 are used to compute sub-scores 281 and 282 using the corresponding rules underlying rule appearances 251 and 252 and parameter values 271 and 272. The parameter values 271 and 272 may be imported as corresponding default parameter values 261 and 262 from a default parameter values storage 260, such as was shown for default parameter values 153. The parameter values 271 and 272 are used to weight the values calculated by the computational rules corresponding to the rule appearances 251 and 252 by multiplying said values by the parameter values 271 and 272 to calculate the sub-scores 281 and 282. The sub-scores 281 and 282 add to provide the total score 289.
One or more of the first party 120, or the reviewer 110 if authorized, may view or edit one or more fields of the viewable range 270 via user interface 245. For example, one or more of the first party 120 or the reviewer 110 may view, select, or edit one or more of the field name 211 or 222, the computational rules corresponding to rule appearance 251 or 252, or the parameter values 271 or 272.
Various user interfaces may be utilized to provide different viewable information to one or more of the first party 120 or the reviewer 110. For example, at least some of the fields displayed in user interface 245 may be protected from viewing from one or more of the first party 120 or the reviewer 110.
Any number of field names (FN), data identifiers (DID), data (DT), data values (V), rule appearances (RA) and corresponding computational rules, parameter values (DV), sub-scores (SS) in addition to the two described above with respect to
The data map 310 includes the field names 311 and 312 and the corresponding values 341 and 341. The values 341 and 342 are data values from the first party data. The field names 311 and 312 specify which portions of the first party data are queried by the scoring engine. The data corresponding to the field names 311 and 312 may be retrieved from a data source, such as data source 320. The data source 320 may be located in the DRP 140 (
The field names 311 and 312 correspond to specific data identifiers (DIDs) 321 and 322 in the first party data, respectively. The DIDs 321 and 322 may be used to fetch the underlying data (DT) 331 and 332, respectively, from the first party data. The data (DT) 331 and 332 may be imported into the data map 310 as data values (V) 341 and 342, respectively. The viewable ranges may include additional field names and additional values. Correspondingly, the data source 320 may include additional DIDs and DT.
In
The parameter values 371 and 372 may be modified to be instead custom parameter values, which can operate as modifiers (e.g., multipliers) to selectively weight the results of the computational rules associated therewith. In
Presentation of the modification user interface 379 may be responsive to a change request entered in the user interface 302. Responsive thereto, the viewable and changeable fields may be presented via the modification user interface 379. As shown, the first parameter value 371 and the second parameter value 372 may be presented and modified via the modification user interface 379 via the user interface 302. Responsive to changes or confirmation of the first parameter value 371 or the second parameter value 372 the modification user interface 379 may return the changes to the (main) user interface 302 for display thereon.
After reviewing or modifying one or more fields in the data map 310, the computational rules may be applied to the data values to produce one or more compliance scores. In
In
As shown, any number of field names (FN), data identifiers (DID), data (DT), data values (V), rule appearances (RA) and corresponding computational rules, parameter values (DV), sub-scores (SS) in addition to the two described above with respect to
In some examples, only selected fields in the data map 310 may be viewable or editable by a selected party (e.g., the first party or the reviewer). For example, only the first party may view or edit the field names and only the reviewer may view or edit the rule appearances and parameter values in some embodiments. In some embodiments, only the reviewer may view or edit the field names and only the first party may view or edit the rule appearances and parameter values in some embodiments. In some embodiments, only the reviewer may view or edit the field names and only the first party may view or edit the rule appearances and parameter values in some embodiments. In some embodiments, both the reviewer and the first party may view and edit the field names, view appearances, and parameter values.
The DRP may control and limit which parties can view the sub-scores (SS) and total score (TS) in the user interface 302.
The configurations, systems, and user interfaces disclosed herein may be used by one or more of a second party (such as a DRP provider), a third party (such as a reviewer), or the first party to generate and obtain one or more compliance scores on the DRP, based on the first party data and the one or more computational rules, for use by the reviewer (third party).
The block 410 to receive authorization from first party that third party is permitted to access first party data stored by second party may include receiving, by a computer system of a second party (DRP provider), an authorization from a first party that a third party (reviewer) be permitted to access first party data stored by the second party. The first, second, and third party are all distinct from each other. The authorization may be electronic authorization received from a first party computing device. The authorization may include a digital code previously established on behalf of the first party to grant access to the stored first party data.
The block 420 to permit third party to access stored first party data may include permitting, by the computer system and responsive to the authorization, the third party to access the stored first party data. Permitting the third party to access the stored first party data may include allowing the third party computing device to access (view or select) one or more portions of the stored first party data. Permitting the third party to access the stored first party data may include allowing access, by a scoring engine, to one or more portions of the store first party data.
The block 430 to select computational rules to apply to stored first party data may include selecting, by the computer system, computational rules to apply to the stored first party data. Selecting the computational rules may include receiving instructions from one or more of the first party or the third party to use one or more computational rules stored on the computer system. Selecting the computational rules may include receiving, at the computer system, one or more computational rules from one or more of the first party or the third party (e.g., reviewer).
The block 440 to compute compliance score based on computational rules and stored first party data may include computing, by a scoring engine of the computer system, a compliance score based on the computational rules and the stored first party data. The compliance score may include one or more sub-scores each computed from only a portion of the stored first party data. Computing the compliance score may include aggregating a plurality of sub-scores (computed from a plurality of the computational rules) to determine the compliance score. Computing the compliance score may include applying one or more parameter modifiers to one or more of the plurality of sub-scores to weight one or more of a plurality of sub-scores (from a plurality of the computational rules), and aggregating the plurality of sub-scores to determine the compliance score.
Computing the compliance score may include applying one or more of the computational rules to a portion of the stored first party data selected by the first party. The portions of the stored first party data may be selected or specified by one or more of the first party, the computational rules, or the third party.
The block 450 to output compliance score may include outputting the compliance score to one or more of the first party or the third party. The compliance score may be output as one or more sub-scores and the aggregate thereof as the compliance score. Outputting the compliance score may include sending the compliance score to the network address of one or more of the first party or the third party.
The method 400 may include categorizing one or more sub-scores or the compliance score to one or more score bands describing preselected value ranges for the one or more sub-scores or compliance score. For example, one or more of the sub-scores or the compliance score may be categorized into value ranges indicating high compliance, medium compliance, low compliance, low risk, medium risk, high risk, or the like range. In such embodiments, outputting the compliance score includes causing the one or more sub-scores or the compliance score to be presented, by the computer system to a user interface at a first party computing device or a third party computing device, as a member of one or more of the preselected value ranges. For example, the compliance score or the sub-scores may be output as members of a visual range, such as green for high compliance, yellow for medium compliance, or red for low compliance.
The method 400 may include receiving the first party data from one or more of the first party or a service provider (e.g., OSP 130 of
The method 400 may include allowing, by the computer system, the first party to view or apply the computational rules, on a first party computing device in communication with the computer system, such as via a command from the first party computing device. The method 400 may include allowing, by the computer system, the first party to view the compliance score on a first party computing device in communication with the computer system.
The DRP platform provider (second party) may generate and disseminate compliance scores with first party data and computational rules on behalf of the third party utilizing method 400. Third parties, such as the reviewer 110 (
The block 510 to receive authorization from first party to access first party data stored by the second party on second party computer system may include receiving, by a third party (reviewer) from a computer system of a second party (DRP provider), an authorization from a first party to access first party data stored by the second party on the computer system. The authorization may be electronic authorization as disclosed herein. The authorization may be received by the third party to access to the first party data. The authorization may be sent and received by the first party to provide access to the first party data. The authorization may be received by the second party (e.g., via the DRP) to provide access to the first party data.
The block 520 to access stored first party data in computer system may include accessing, pursuant to the authorization, the stored first party data in the computer system. For example, the (second party) computer system which provides the DRP may store the first party data and may permit access to the first party data by one or more of the scoring engine or the third party. Accessing the stored first party data may include causing the computer system to present the stored first party data on a user interface generated by the computer system, such as to the third party. Accessing the stored first party data may include identifying, by a third party computing device in communication with the computer system, one or more portions of the stored first party data for generating the compliance score. The authorization may be authorization to permit access to only selected data sets of the first party data.
The block 530 to cause computer system to select computational rules may include causing the computer system to select at least one of a plurality of computational rules. Causing the computer system to select at least one of a plurality of computational rules may include providing, by a third party computing device in communication with the computer system, instructions to select at least one of the plurality of computational rules stored on the computer system, such as via a user interface. For example, causing the computer system to select at least one of a plurality of computational rules may include causing the computer system to present at least some of the plurality of computational rules on a user interface generated by the computer system. Causing the computer system to select at least one of a plurality of computational rules may include providing, to the computer system, one or more computational rules from a third party computing device in communication with the computer system.
Causing the computer system to select at least one of a plurality of computational rules may include selecting, by a third party computing device in communication with the computer system, a plurality of computational rules, at least some of the plurality of computational rules including rules for calculating a plurality of sub-scores based on discrete data of the stored first party data and aggregating the plurality of sub-scores to determine the compliance score. The compliance score may be one or more sub-scores. Causing the computer system to select at least one of a plurality of computational rules may include selecting, by a third party computing device in communication with the computer system, one or more parameter modifiers for weighting one or more of the plurality of sub-scores.
The plurality of computational rules may include machine readable and executable instructions, to be carried out on the computer system, for categorizing one or more of the plurality of sub-scores or the compliance score to one or more score bands describing preselected value ranges for the one or more of the plurality of sub-scores or compliance score, such as described above with respect to the method 400.
The block 540 to cause scoring engine to apply selected computational rules to stored first party data to compute compliance score may include causing a scoring engine of the computer system to apply the selected at least one of a plurality of computational rules to the stored first party data for computing a compliance score. The scoring engine may be the scoring engine of a DRP as disclosed herein. Causing the scoring engine to apply the selected at least one of a plurality of computational rules to the stored first party data for computing a compliance score may include providing a command to the computer system to begin calculating the compliance score, such as by a third party computing device in communication with the computer system. The command may be entered by the third party in a user interface provided by the computing device (e.g., by the DRP stored on the second party computing device).
The stored first party data may include a plurality of discrete data sets. A plurality of computational rules may be used to compute a plurality of sub-scores with the discrete data sets. The compliance score may include the plurality of sub-scores formed with the plurality of discrete data sets and may be a sum of the plurality of sub-scores. In such embodiments, causing the scoring engine to apply the selected at least one of a plurality of computational rules to the stored first party data for computing a compliance score may include causing the scoring engine to apply the selected plurality of computational rules to selected discrete data sets of the stored first party data for computing a plurality of sub-scores to provide the compliance score(s).
The block 550 to cause computer system to output compliance score to third party may include causing the computer system to output the compliance score to the third party by providing a command to output the compliance score to a computing device of the third party. Causing the computer system to output the compliance score may include causing the computer system to present one or more of a plurality of sub-scores or the compliance score to the third party, such as via a user interface generated by the computer system. Causing the computer system to output the compliance score may include causing the computer system to present the compliance score as a member of a value range. For example, the compliance score may be output as a member of a color-coded value range as disclosed herein, such as via a user interface generated by the computer system. One or more of a plurality of sub-scores or the compliance score may be output as a member of one or more of the preselected value ranges on a user interface generated by the computer system.
The method 500 may include receiving, at a third party computing device, a request for a benefit from the first party based on the compliance score. The method 500 may include requesting, by a third party computing device in communication with the computer system, a compliance score for the first party.
The block 610 to cause first party data to be stored in computer system of second party includes causing, by a first party computing device, first party data to be stored in a computer system of a second party (DRP provider) in communication with the first party computing device. Causing the first party data to be stored in the computer system of the second party may include inputting at least some of the first party data into the computer system. Inputting at least some of the first party data into the computer system may include inputting the first party data from remote computing device such as from the first party computing device or a remote service platform (e.g., OSP 130 of
The block 620 to access scoring engine stored on computer system includes accessing, by a user interface of the computer system, a scoring engine stored on the computer system. Accessing the scoring engine may include selecting at least one computational rule for the scoring engine to apply to the first party data to compute the compliance store. For example, accessing the scoring engine may include selecting the at least one stored computational rule from a plurality of computational rules for the scoring engine to apply for computing the compliance store. At least some of the plurality of computational rules are stored in the computer system. In such embodiments, the plurality of computational rules may be identified (e.g., selected or provided to the computer system) by the first party or the third party.
Accessing the scoring engine may include selecting a plurality of computational rules, at least some of the plurality of computational rules including rules for calculating a plurality of sub-scores based on discrete data of the stored first party data and aggregating the plurality of sub-scores to determine the compliance score. The compliance score may be one or more sub-scores computed from only a portion of the stored first party data or may be the sum of the sub-scores.
The plurality of computational rules may include parameter modifiers for weighting one or more of the plurality of sub-scores as disclosed herein. Selecting the at least one stored computational rule from a plurality of computational rules includes selecting one or more parameter modifiers to apply to one or more of the plurality of sub-scores. The plurality of computational rules includes machine readable and executable instructions, to be carried out on the computer system, for categorizing one or more of the plurality of sub-scores or the compliance score to one or more score bands describing preselected value ranges for the one or more of the plurality of sub-scores or compliance score as disclosed herein.
The block 630 to cause scoring engine to apply at least one stored computational rule to stored first party data to compute compliance score and display compliance score on user interface includes causing, by the user interface, the scoring engine to apply at least one stored computational rule to the stored first party data to compute a compliance score and display the compliance score on the user interface. Causing the scoring engine to apply at least one stored computational rule to the stored first party data to compute a compliance score may include entering an execute or start command into a user interface displayed on the first party computing device. Causing the scoring engine to apply at least one stored computational rule to the stored first party data to compute a compliance score includes selecting one or more discrete data sets of the stored first party data for applying the scoring engine upon.
The block 640 to provide network address of third party includes providing, by the user interface, a network address of a third party. Providing the network address of a third party may further include providing an identification of the third party to the computer system, such as indicating a third party network address or identification code to the computer system. For example, the first party may identify the reviewer to the second party computer system by providing the network address of the reviewer. Such identification may be provided with the authorization for the third party to access the first party data on the computer system (of the second party).
The block 650 to cause computer system to transmit to network address authorization to third party to access stored first party data on computer system includes causing, by the user interface, the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system. For example, the first party may input, into a user interface generated by the second party computer system (e.g., DRP), a command or authorization to the second party computer system to transmit the network address authorization to the third party to view the first party data. In such contexts, the first party data may include the compliance score(s). For example, the second party computer system my save the compliance scores with the first party data used to compute the compliance score, such as in a first party database stored in the second party computer system. Causing the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system may include authorizing (or providing a command to) the second party to output the compliance score to the third party. For example, causing the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system may include entering an output command into the user interface. Causing the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system may include outputting the compliance score to the network address.
Causing the computer system to transmit to the network address an authorization to the third party to access the stored first party data on the computer system may include causing the computer system to present one or more of a plurality of sub-scores or the compliance score as a member of one or more of the preselected value ranges on a user interface generated by the computer system. The preselected value ranges may be presented as color-coded ranges, numerical ranges, or the like as disclosed herein.
While methods 400, 500, and 600 are described above from the prospective of a single party (e.g., the second party DRP provider, the third party reviewer, or the first party, respectively), in some examples, more than one of the parties actions may be required to accomplish generating a compliance score on the DRP with the first party data for the third party to review. For example, responsive to a request for a benefit from the first party (e.g., loan, enrollment, etc.), the third party may request a compliance score from the second party based on first party data stored by the second party. Responsive to the request, the first party may authorize the second party to grant access to the third party to review the first party data stored on the second party DRP. Responsive to receiving access the third party may initiate the scoring engine to execute computational rules using the first party data to determine the compliance score.
One or more of the compliance scores or the first party data may be provided from a tax-assisting service platform. For example, the tax-assisting service platform may store first party tax, account, and address data, which may be provided to the DRP 140 (of
The methods, systems, devices, and computer readable and executable programs for generating and obtaining compliance scores with data from brick-and-mortar or e-commerce environments disclosed herein may be used by credit underwriters, banking institutions, or businesses to determine if a first party qualifies for a specific categorization or benefit.
Credit underwriters lend to companies based on a company's management, financial statements, collateral, personal credit, and industry trends. A common large dollar line item that appears on a company's financial statements is tax liabilities. Credit underwriters take a company's financial health into account, and lending credit to a company with inaccurate tax liabilities is high risk. A compliance (e.g., risk) score is a resource that credit underwriters can use to ensure they are lending credit to companies who calculate and remit taxes accurately. The compliance scores may indicate the first party's satisfaction of, or a level or satisfaction of, one or more criteria required to qualify for a benefit offered by a third party, such as the credit underwriters (e.g., the reviewer 110).
The compliance score may be calculated with computational rules as executed by the scoring engine. The computational rules may be used to demonstrate the first party's compliance (e.g., risk) with one or more specific criteria encoded therein, as demonstrated by the first party data. For example, the criteria may include the time in business, such as the number of months selling. Such criteria help establish business history and may be measured in years, months, weeks, or days since an initial invoice.
Criteria that may be used to determine the tax compliance health score are discussed in more detail below. For example, the criteria may be encoded as compliance rules within machine readable and executable instructions for assigning a compliance score to the first party based on one or more of an age of a first party account, a number of open invoices beyond a selected duration that belong to the first party, a statistic reflecting an accuracy of invoices belonging to the first party, a statistic reflecting a length of time that the first party has remitted a mandated usury, an amount of time the first party has with a delinquent usury, a statistic reflecting a validity of mailing addresses of other parties in transactions with the first party, a perceived likelihood of investigation of the first party by a regulatory entity, or a presence of adverse public records corresponding to the first party. These can be used individually, each with scores, and bands for ranges of scores. Or, an aggregate score may be computed as described later in this document.
The number of unpaid invoices beyond a selected time period may be used as a criterion in the computational rules. For example, the number or percentage invoices that are unpaid for longer than six months old may inform the third party about the health of the first party's accounts.
Accuracy of invoices for purposes of tax computation may be used as a criterion in the computational rules. This accuracy may include the accuracy of the customer addresses in the invoices. An address pull may be provided by the DRP 140 or the OSP 130 (
Invoices can be checked for tax transaction addresses, for example using address validation 756 disclosed below (
The computation and score for the accuracy of invoices can be the percent of inaccurate invoices over the whole, such as 5 out of 100 invoices during a period had errors, so they had a 5% invoice error rate for the period. The percentage can be determined per time period. A monthly time period may be better to keep consistent with current standard credit reporting practices, while quarterly gives a larger sized data pool for the overall percentage.
Sample ranges of compliance or risk may include a high risk for 65.01-100% invoice error rate, a medium risk for 35.01-65% invoice error rate, a low risk for 0-35% invoice error rate. The risks ranges may be displayed in color-coded ranges, with green for low risk, yellow for medium risk, red for high risk. The risk ranges may conversely correspond to compliance ranges, such as low compliance equating to high invoice error rates, medium compliance equating to medium invoice error rates, and high compliance equating to low invoice error rates.
The length of time remitting taxes may be a criterion in the computational rules. The longer history a company has in collecting and remitting taxes provides for a better picture of tax compliance behavior. The length of time (e.g., counted as number of months, weeks, etc.) may account for younger companies.
In banking, most companies cannot receive financing until they can show 3 years of financial information. Accordingly, a length of time in remitting taxes of 36 months or more may be associated with a low risk and displayed as green. A length of time in remitting taxes of 13-35 months may be associated with a medium risk and displayed as yellow. A length of time in remitting taxes of 0-12 months may be associated with a high risk and displayed as red.
The lateness in tax remittance may be a criterion in the computational rules. Lateness in tax remittance can be a primary factor for the credit score. A company who remits timely is more likely to not misuse any tax funds received by its customers.
The computational rules for lateness in tax remittance can be performed in a number of ways. For example, at the first party data and reference data from a tax assistance platform may be used to determine when tax remittance is due and if all liabilities have been met. Such tax assistance platforms may indicate whether a customer has sufficiently funded their liabilities. Not funding the liabilities on time results in the filing (remittance) being delayed.
This factor could be a percentage of how many months there is a lateness, divided by the whole number of months. For example, if a company pays the tax assistance platform to handle 50 U.S. returns for filing and they don't have enough to fund 10 in a given month or quarter, they would get marked down for having not filed or filed a late return regardless of how many returns were late. Having multiple late months increases the mark downs of the overall compliance score. Or, this factor could be a percentage of how many of the individual filings that the tax assistance platform handles were late over the whole.
The computational rule could utilize a selected duration (e.g., number of years) of historical data to determine a percentage. For example, in the past 36 months, 2 months reflected late payments, so they have a 5% rate of late remittance history. Possible ranges for non-compliance or risk may be 0-5% for low risk, 5.01-10% medium risk, and greater than 10% is a high risk.
Likelihood of receiving a tax audit per industry, whether a particular industry or company is more likely to be audited, may be used in the computational rules. For example, a categorization of the first party's industry may be provided in the first party data. The computational rules may reference statistical data to calculate the likelihood of the first party receiving an audit. This can be performed by a number of ways. For example, as a tax assistance service platform receives audit notices per industry (e.g., customers let the platform know when they are being audited so the platform can assist), the platform would be able to determine whether a particular industry is more likely to be audited. A compliance score (e.g., sub-score) may be calculated based on the complexity of the industry of the first party, such as higher scores for more complex industries, such as beverage-alcohol, hospitality, and fuel industries.
Likelihood of being subjected to a tax audit per jurisdiction may be used in a computational rule, such as whether one jurisdiction is more likely to audit a particular industry or company remitting a certain dollar threshold. Examination of this computational rule can be performed by a number of ways. For example, as a tax assistance service platform receives audit notices from jurisdictions (e.g., as customers are letting the platform know when they are being audited so the platform can assist), the platform would be able to determine whether a specific jurisdiction is more likely to audit. Utilizing the platform's aggregate data (across all clients or industries), the platform can determine if one industry is more likely to be susceptible to inaccurate tax compliance due to issues such as complicated tax laws. The computational rules may assign compliance scores for likelihood of audit, such as per jurisdiction. For example, a higher score may be provided for Brazil, because Brazil has very complex tax laws so could create a riskier industry score.
Adverse public records such as tax liens, bankruptcy, and judgments may be used in the computational rules. For example, a computational rule may examine the first party data or reference data from a third source to determine if the first party is subject to liens, filed for bankruptcy protection, or has any judgments against it. The computational rule may be applied to a selected time period such as the last 1 year, the last 3 years, the last 5 years, the last 7 years, or the like. Companies who have received tax liens would negatively affect the score. Accordingly, if no liens are present in the time period the first party may receive a perfect numerical score, which may be displayed in green for low risk/high compliance. If liens are present, the numerical score (e.g., sub-score) may be negatively affected, which may be displayed as red for high risk/low compliance.
Other criteria may be utilized in the computational rules. Any of ranges, sub-scores, or compliance scores disclosed herein can be categorized and displayed in a visual range, such as a color-coded range.
The compliance score could have many ranges, such as 0 to 10, 0 to 100, etc. Or, the compliance score could range from 0 to an indefinite number depending on the percentile weighting of each criterion and the data available to the data source.
The business would determine whether the score should be aligned with that of other reporting agencies in the event of potential partnerships.
Aspects of
Tax-assisting service platform 740 includes a tax content management component 744 for use by TAE 742. Tax content management component 744 may receive tax information from one or more tax jurisdictions 730, such as sample tax jurisdictions 731, 732, and 733. Tax content management component 744 includes a database 746 for storing the received tax information in the form of tax rules, rates, exemptions, etc.
In addition, tax-assisting service platform 740 includes tax-assisting engines (TAE) 742. TAE 742 include a tax computation engine 753, a tax health score evaluation engine 757, and even an address validation engine 756.
In this example, tax-assisting engines 742 may be invoked via a TAE Application Programming Interface (API) 779. Only one TAE API 779 is shown implemented here, while multiple ones may be implemented instead, for example one for invoking each of tax computation engine 753, tax health score evaluation engine 757, and address validation engine 756. In this example, TAE API 779 is configured to receive a request 771 from ERP 721. Request 771 has data 772 of customer entity 711. Data 772 may be looked up from customer data 729 in database 728. In response to receiving request 771 with its data 772, TAE API 779 invokes one of tax-assisting engines 742 to perform its service. Then, TAE API 779 is configured to transmit a response 774. Response 774 can be transmitted back to the sender of request 771, or otherwise.
If tax computation engine 753 is thus invoked by request 771, it may calculate a tax liability of an amount of tax due, based on data 772. In that case, response 774 includes a component of a tax liability 775 that indicates the calculated amount.
If address validation engine 756 is thus invoked by request 771, it may perform an address-validation process, based on data 772. In that case, response 774 includes a component of an address feedback 777. The latter can be a message that an address is valid, or not, or propose a different address.
In some embodiments, tax-assisting service platform 740 may perform a variety of services in addition to what is described above. For one example, tax-assisting service platform 740 may accumulate and store customer sales data 772.
In another example, tax-assisting engines 742 may further include one or more additional engines and/or functional components than are shown in the example of
The reviewer 762 may be similar or identical to the reviewer 110 of
At least some of the first party data, the sub-scores, the compliance scores or the like may be presented to the third party by the authorization of the first party, via user interfaces.
The user interface 900 includes an option to tell the tax support provider about the intended reviewer. For example, fields may be presented to provide the first name, last name, and e-mail address of the reviewer. Additionally, or alternatively, the user interface 900 may present a field for providing the network address of the reviewer (e.g., third party) on the screen 918.
The user interface 900 includes an option (e.g., button) to authorize the third party reviewer to access the first party data on the tax support provider's platform, such as the transaction data. Responsive to authorizing the tax support provider to allow the third party to access the first party's data thereon, the tax support provider's platform (e.g., DRP 140 or the tax-assisting service platform 740) outputs said authorization to the reviewer, such as via e-mail.
The user interface 1000 may be presented from the tax support provider on behalf of the reviewed company (e.g., first party). For example, the user interface 1000 may be the user interface 146 displayed on the computer 114 (
The user interface 1000 may include another link to request another company to store its records on the tax support provider's platform for another review, such as by a “click here” link. Responsive to clicking the link to review the first party data, the user interface 1000 may be directed to a webpage or the like displaying the first party data. In such examples, the first party data may include a list of sub-scores and the total compliance score (e.g., risk score).
As shown, the first field F1 may list the number of months selling as the criterion, a value of 38, and a green presentation to indicate a low risk. The second field F2 may list the percentage of invoices unpaid for 6 months, with a value of 14, and an individual evaluation of yellow to indicate a medium risk. The third field F3 lists the percentage of inaccurate invoices and lists the value as 7, which corresponds to a low risk indicated by green. The fourth field F4 may list the number of months remitting taxes as the criterion, a value of 35, and a green presentation to indicate a low risk. The fifth field F5 may list the percentage of late tax remittance, with a value of 3, and an individual evaluation of yellow to indicate a medium risk. The sixth field F6 may list the lateness of tax remittance in days, with a value of 8, and an individual evaluation of yellow to indicate a medium risk. The seventh field F7 lists the percentage of likelihood of tax audit for industry and lists the value as 9, which corresponds to a low risk indicated by green. The eighth field F8 lists the percentage of likelihood of tax audit for jurisdiction and lists the value as 15, which corresponds to a medium risk indicated by yellow. The ninth field F9 lists the number of adverse proceedings against the first party and lists the value as 0, which corresponds to a low risk indicated by green.
Each of the ranges in the individual evaluations may be editable by selecting a “change” option, such as by the third party to re-categorize the sub-scores by changing the individual ranges.
The user interface 1100 may include an option to review company data by a total risk score (e.g., total compliance score).
The coefficients may selectively weight each sub-score. Each coefficient may be changed by selecting a prompt to change the coefficient, such as to change the weights of one or more of the sub-scores and the total compliance score.
The user interfaces 800-1200 may be used by the first party (e.g., customer of tax-assisting service platform) and the third party (e.g., reviewer) to initiate, authorize, carry out, and review the results of the generation of compliance scores on a second party platform (e.g., DRP 140 or tax-assisting service platform 740) using first party data stored thereon, for a third party to review.
The configurations disclosed herein provide a safe, secure, private way to review a first party's compliance with one or more criteria for receiving a benefit from a third party, using first party data and computational rules on a second party computer system.
Kavounas, Gregory T., Kushniruk, Marshal, Searles, Cassandra, Searles, Cassandra, Ingram, William, Ingram, William
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10354213, | Dec 27 2011 | Applied Predictive Technologies, Inc. | Natural experiment finder system and method |
10445818, | May 21 2012 | Formula Labs, LLC | System and method for identifying and co-ordinating an alternate delivery of one or more selected items |
10769611, | Jun 06 2014 | GEOINVOICE, INC.; GEOINVOICE, INC | Location based system and method for calculating sales and use tax |
10878357, | Dec 27 2011 | Applied Predictive Technologies, Inc. | Natural experiment finder system and method |
5772251, | Oct 15 1996 | Income tax information organizer | |
5799283, | May 10 1995 | Taxvantage LLC | Point of sale governmental sales and use tax reporting and receipt system |
6052710, | Jun 28 1996 | Microsoft Technology Licensing, LLC | System and method for making function calls over a distributed network |
6189005, | Aug 21 1998 | International Business Machines Corporation | System and method for mining surprising temporal patterns |
6317750, | Oct 26 1998 | Oracle International Corporation | Method and apparatus for accessing multidimensional data |
7512623, | Jul 06 2001 | Angoss Software Corporation | Method and system for the visual presentation of data mining models |
7783536, | Jul 26 2002 | Oracle International Corporation | Apparatus and method configurable for local jurisdictions that facilitates determining taxes |
7933803, | Jun 23 2003 | Thomson Reuters Enterprise Centre GmbH | Universal tax engine |
8620578, | Jun 24 2009 | CLOUDMADE, LTD | Centralized location storage system and method |
8725407, | Nov 09 2009 | United Parcel Service of America, Inc. | Enhanced location information for points of interest |
9760915, | Feb 01 2007 | PTP Oneclick, LLC | System and method for preparing multi-level tax returns |
20010034748, | |||
20010054172, | |||
20020138765, | |||
20040002906, | |||
20040215599, | |||
20050209939, | |||
20050251733, | |||
20060069658, | |||
20060111990, | |||
20070136158, | |||
20070136159, | |||
20090006149, | |||
20100082685, | |||
20120259752, | |||
20130013471, | |||
20150058962, | |||
20160055322, | |||
20190287182, | |||
20200052908, | |||
20200090171, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 26 2020 | AVALARA, INC. | (assignment on the face of the patent) | / | |||
Feb 26 2020 | SEARLES, CASSANDRA | AVALARA, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 052537 | /0805 | |
Feb 26 2020 | INGRAM, WILLIAM | AVALARA, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 052537 | /0805 | |
Feb 26 2020 | KAVOUNAS, GREGORY T | AVALARA, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 052537 | /0805 | |
Mar 04 2020 | KUSHNIRUK, MARSHAL | AVALARA, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 052537 | /0805 | |
May 23 2024 | AVALARA, INC | BLUE OWL CREDIT INCOME CORP F K A OWL ROCK CORE INCOME CORP | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 067563 | /0600 |
Date | Maintenance Fee Events |
Feb 26 2020 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Feb 13 2027 | 4 years fee payment window open |
Aug 13 2027 | 6 months grace period start (w surcharge) |
Feb 13 2028 | patent expiry (for year 4) |
Feb 13 2030 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 13 2031 | 8 years fee payment window open |
Aug 13 2031 | 6 months grace period start (w surcharge) |
Feb 13 2032 | patent expiry (for year 8) |
Feb 13 2034 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 13 2035 | 12 years fee payment window open |
Aug 13 2035 | 6 months grace period start (w surcharge) |
Feb 13 2036 | patent expiry (for year 12) |
Feb 13 2038 | 2 years to revive unintentionally abandoned end. (for year 12) |